article thumbnail

An Interview with IO's CISO, Bob Butler, on Logical and Physical.

CTOvision

Podcast: Play in new window | Download. In this podcast I interviewed Bob Butler, Chief Information Security Officer at IO. IO is the leading provider of next-generation modular data center technology and services designs,'

article thumbnail

The ‘Great IT Rebrand’: Restructuring IT for business success

CIO Business Intelligence

While cybersecurity has traditionally been under IT’s wing, many firms are revamping reporting structures to create a direct line from the chief information security officer to the CEO. This is recognition that security is a corporate function and covers all aspects of the business, not just the technology function,” Alkone says.

Insurance 336
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Invincea Platform Enhances Large-Scale Enterprise Deployments With FreeSpace 4.0 and Invincea Management Service 2.1 Releases

CTOvision

Extends Platform Coverage to Windows 8.1 client software,” said Arindam Bose, FVP & Information Security Officer, BBCN Bank. delivers key features and benefits, including: Microsoft Windows 8.1 Improved support for Windows user profile persistence and roaming/network-based user profiles. . – bg.

article thumbnail

When least privilege is the most important thing

CIO Business Intelligence

In the ever-evolving realm of information security, the principle of Least Privilege stands out as the cornerstone of safeguarding sensitive data. However, this fundamental concept, emphasizing limited access to resources and information, has been progressively overlooked, placing our digital ecosystems at greater risk.

Backup 321
article thumbnail

Second Factor Authentication With Security Keys

CTOvision

Sam Srinivas, Product Management Director, Information Security, Google, is the organization’s vice president. Both keys work with Unix, Windows, OSX and are recognized as USB HID devices. The board level members include Google , RSA, PayPal, most of the major credit card companies, and other financial institutions.

article thumbnail

Avoiding The Risks Of Vulnerable Endpoints

CTOvision

Read Bernard Parsons explain how you can avoid the risks of vulnerable endpoints on Information Security Buzz : In today’s world of constant and escalating threats, with breaches becoming a commonplace occurrence, PCs are a constant headache for security teams when it comes to securing IT infrastructure.

Linux 30
article thumbnail

Meet MailSniper, a tool to search Microsoft Exchange emails for sensitive info

Network World

Beau Bullock , from the penetration testing firm Black Hills Information Security , cited a 2016 Mandiant M-Trends Report ( pdf ) which claimed organizations are compromised an average of 146 days before detecting a breach.

Meeting 150